Analysis
-
max time kernel
128s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 21:53
Behavioral task
behavioral1
Sample
sdfgsdf.exe
Resource
win7-20240903-en
7 signatures
150 seconds
General
-
Target
sdfgsdf.exe
-
Size
74KB
-
MD5
da05df2464aac7f78bda7db6286fbc9e
-
SHA1
a3030350716b16ed71b5754efdeffacbcfaeaee7
-
SHA256
1f981bb1fd6930e5fbfdea2596c7a7c3d8bd754b6fabcf6dd493ae3a965be2f7
-
SHA512
8120b9a2179c81a2384430109a065259643d3466fc191b88e9799fffe5dc3640e7e213c8a17ce1f3d3572e7bf6b3503890a80483999fd9fb35067ab6524ab13c
-
SSDEEP
1536:jUD0cxVGlCBiPMV+GgIyYIrH1bS/iUOwq4QzcmLVclN:jUAcxVMWiPMV1gIyZH1bSfO+Q/BY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
127.0.0.1:9999
127.0.0.1:7473
147.185.221.17:4449
147.185.221.17:9999
147.185.221.17:7473
Mutex
avteivezmdvkonymgmf
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral2/memory/2792-1-0x0000000000A10000-0x0000000000A28000-memory.dmp VenomRAT -
Venomrat family
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe 2792 sdfgsdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2792 sdfgsdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2792 sdfgsdf.exe